Reconciling role based management and role based access control
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
A Model for Static Conflict Analysis of Management Policies
BT Technology Journal
Concepts, Activities and Issues of Policy-based Communications Management
BT Technology Journal
Fault Management in Distributed Systems: A Policy-Driven Approach
Journal of Network and Systems Management
Fault Management in Distributed Systems: A Policy-Driven Approach
Journal of Network and Systems Management
Towards A Role-Based Framework for DistributedSystems Management
Journal of Network and Systems Management
A Policy Based Role Object Model
EDOC '97 Proceedings of the 1st International Conference on Enterprise Distributed Object Computing
Derivation of Backup Service Management Applications from Service and System Models
DSOM '99 Proceedings of the 10th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management: Active Technologies for Network and Service Management
A Comparative Study of Policy Specification Languages for Secure Distributed Applications
DSOM '02 Proceedings of the 13th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management: Management Technologies for E-Commerce and E-Business Applications
A Policy Management System for Mobile Agent-Based Services
MATA '01 Proceedings of the Third International Workshop on Mobile Agents for Telecommunication Applications
Towards a "Good" Functional and Executable Behavior Model
ECOOP '97 Proceedings of the Workshops on Object-Oriented Technology
Monitors for History-Based Policies
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
Policy-enabled mechanisms for feature interactions: reality, expectations, challenges
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: Directions in feature interaction research
Applying Semantic Knowledge to Real-Time Update of Access Control Policies
IEEE Transactions on Knowledge and Data Engineering
Modality conflicts in semantics aware access control
ICWE '06 Proceedings of the 6th international conference on Web engineering
Policies and conflicts in call control
Computer Networks: The International Journal of Computer and Telecommunications Networking
Configuring policies in public health applications
Expert Systems with Applications: An International Journal
A lattice-based approach for updating access control policies in real-time
Information Systems
A survey of autonomic computing—degrees, models, and applications
ACM Computing Surveys (CSUR)
Controlling Access to XML Documents over XML Native and Relational Databases
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
A formal logic approach to firewall packet filtering analysis and generation
Artificial Intelligence Review
Analysis of firewall policy rules using traffic mining techniques
International Journal of Internet Protocol Technology
Formal analysis of policy-based self-adaptive systems
Proceedings of the 2010 ACM Symposium on Applied Computing
A cautionary note about policy conflict resolution
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
A survey of system configuration tools
LISA'10 Proceedings of the 24th international conference on Large installation system administration
Model-based refinement of security policies in collaborative virtual organisations
ESSoS'11 Proceedings of the Third international conference on Engineering secure software and systems
Semantic Web-Based Management of Routing Configurations
Journal of Network and Systems Management
A study on hierarchical policy model for managing heterogeneous security systems
ICCSA'11 Proceedings of the 2011 international conference on Computational science and its applications - Volume Part IV
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
Extending context descriptions in semantics-aware access control
ICISS'06 Proceedings of the Second international conference on Information Systems Security
An approach to understanding policy based on autonomy and voluntary cooperation
DSOM'05 Proceedings of the 16th IFIP/IEEE Ambient Networks international conference on Distributed Systems: operations and Management
Hi-index | 0.01 |